A health status platform includes a receiving component that receives a test result a test of a biological sample collected from a human patient. The test result includes an indication of a presence of an infectious disease in the patient, and an identification and a verification of the patient. The platform includes a certificate component that issues a certificate of origin of the biological sample; and a data merging component that cooperates with a venue access manager that controls access to a venue. The data merging component implements a distributed ledger system that stores encrypted test results of the patient and the identification and verification of the patient, and an end-to-end encryption system that receives an encrypted venue access request from a venue access manager, decrypts the access request, determines if an access request is valid, and if valid, provides an encrypted certificate of origin to the venue access manager.
|
1. A health safety kiosk, comprising:
a health test sample station;
a display and user interface component;
a communications component;
an application biometric key (abk) component comprising machine instructions for operating the health safety kiosk; and
a processor accessing the abk component to:
store one or more user profiles in memory, each of the one or more profiles representing a unique type of biometric sample data;
receive a representation of biometric sample data obtained from a user, and store the representation in one of the one or more profiles in the memory in read-only format, the representation uniquely identifying the user;
receive test sample data from a test sample of the user, the test sample provided by the user at the test station;
analyze the test sample of the user to produce a test sample result, the test sample result indicating a presence in the user of an infectious disease;
store the test sample data and the test sample result in the memory in read-only format;
receive a request from an external device to provide the representation and the test sample data to the external device, the request identifying the external device; and
control the health safety kiosk to provide the test sample result and the representation to the external device.
13. A health status certification method, executed at a health safety kiosk, the health safety kiosk comprising:
a health test sample station;
a display and user interface component;
a communications component;
an application biometric key (abk) component comprising machine instructions for operating the health safety kiosk, and
a processor accessing the abk component to:
store an identification unique to the abk component in a memory in read-only format;
store one or more profiles in the memory, each of the one or more profiles representing a unique type of biometric sample data;
receive a representation of biometric sample data obtained from a user, and storing the representation in one of the one or more profiles in the memory in read only format, the representation uniquely identifying the user;
receive health test sample data from a health test sample of the user;
analyze the health test sample data to generate a health test sample result, the health test sample result indicating a presence of an infectious disease in the user;
store the health test sample data and the health test sample result in the memory in read-only format;
receive a request from an external device to provide the representation and the health test sample data to the external device, the request identifying the external device; and
provide the health test sample data and the representation to the external device.
2. The health safety kiosk of
3. The health safety kiosk of
determines the desired type of biometric data is stored in the memory; and
controls the health safety kiosk to send biometric sample data corresponding to the desired type to the external device.
4. The health safety kiosk of
compares the separate representation to one or more representations stored in the memory;
determines a sufficient match exists; and
controls the health safety kiosk to transmit a match certification to the external device.
5. The health safety kiosk of
compares the separate representation to one or more representations stored in the memory;
determines a sufficient match exists; and
controls the health safety kiosk to display a match certification.
6. The health safety kiosk of
wherein the processor, in response to the request received from the external device, controls the health safety kiosk to provide the encoded biometric sample data and the encoding key to the external device,
wherein the processor, using an encoding key, encrypts the test sample data prior to storage in the memory.
7. The health safety kiosk of
received biometric sample data;
received test sample data;
received requests from external devices, comprising, an identification of the external device, a location of the external device, and a time and date of the request; and
responses sent by the health safety kiosk to the external devices, wherein the metadata associated with the received test data sample comprises time, date, and location of the test sample data,
wherein the processor controls the health safety kiosk to provide the metadata associated with the test sample data with the response.
8. The health safety kiosk of
automatically controlling the health safety kiosk to send the response after receipt of the request;
controlling the health safety kiosk to display a prompt to the user, and causing the health safety kiosk to send the response after receiving a direction to do so in reaction to the prompt; and
controlling the health safety kiosk to display the response on the interface component.
9. Them health safety kiosk of
10. Them health safety kiosk of
direct the user to operate the health safety kiosk to obtain the test sample;
control the health safety kiosk to provide the test sample data from the test sample to the abk component;
direct the user to operate the health safety kiosk to obtain a biometric sample; and
control the health safety kiosk to generate a representation of biometric sample data from the biometric sample, wherein the biometric sample comprises one or more of a retina scan, a fingerprint, a facial image, and a voice recording,
wherein the biometric sample is obtained within an adjustable threshold time of the test sample.
11. The health safety kiosk of
12. The health safety kiosk of
14. The method of
providing on the display, instructions for obtaining, submitting, and viewing the health test sample result of a user,
receiving through the user interface, an identification of the user,
providing a prompt to select a health test sample type,
providing, through the display, instructions to operate the test sample station to obtain the selected health test sample and to generate the health test sample result, and
providing the health test sample result to the user.
15. The method of
17. The method of
|
This application is a continuation of U.S. patent application Ser. No. 16/900,803, entitled HEALTH STATUS SYSTEM, PLATFORM, AND METHOD, filed Jun. 12, 2020, the disclosure of which is hereby incorporated by reference.
Management of federally protected personal information including but not limited to data governed by the Health Insurance Portability and Accountability Act (HIPPA), the Family Educational Rights and Privacy Act (FERPA), and others pose risk for institutions responsible for maintaining privacy. Several technological innovations have been created to protect information owned by healthcare providers, universities, and financial institutions. There have been changes in the laws regarding some of these regulated data. For example, there are new regulations around health record and transportability for Personal Health Information (PHI). Likewise, in the presence of COVID-19, there have been policy discussions around concepts such as contact tracing.
The threats, including infection, resulting from an epidemic, pandemic, bio-terrorism or biological warfare are driving organization to consider restricting access to their venues, modes of transportation, and activities to individuals that have been tested and are, within the limits of the test: sensitivity, specificity, surety, etc. infection free and/or are immune to infection. One approach to accomplish this is to test at the point of entry by clinical personnel. For example, it was recently announced during the SARS-CoV-2 pandemic that visitors to the White House were screened for the virus prior to being allowed to meet with the President. In this case each test is performed on site and the results reported directly to the person being tested by those conducting the test. Each person's nose or throat is swabbed and the resulting bio-sample is analyzed for indications of infection. In some applications, body fluids, blood or mucus may be sampled/tested, including, for example, to test for sexually-transmitted diseases and other diseases. These onsite tests generally take 15 to 20 minutes from sample collection to result.
Similarly, other sites such as nursing homes, hospitals and meat processing facilities are regularly testing employees before allowing them access to the premises. In all these cases the test results are single use at that location and are not generally transferable or reusable at other settings.
Several entities are moving rapidly to create the onsite and point of care infrastructure necessary to support broad application of testing at locations like airports, sporting and entertainment venues, vacation rentals, car rentals, taxis, ride share, and others.
In addition, diagnostic manufacturers are working on home testing kits so that persons can test themselves in the privacy of their home prior to departing for an event or series of events. In these cases, the home test could lead to expedited medical care or direct distribution of pharmaceuticals like “TamiFlu” in the case of influenza.
There is a tension between the public health interest in ensuring a venue does not pose a health risk and the privacy associated with personal health information. There is a need for an infrastructure to maintain the status of all these test results in such a way that the test results can be provided at different locations to the benefit of the attendees, without being detrimental to the person being tested. Moreover, access to the test results could be managed by various parties from the person being tested, to an employer, or an owner of a venue.
For example, when a user has been tested and shown not to be infected with any single or multiple infectious diseases, that disease free status need not only be used once, it could provide access to any number of venues for a specified period of time under the control of the user.
A health status method executed by a processor includes receiving from a test system, by the processor, a representation of biological sample data of a human sample collected from a human user and analyzed by the test system for identification of a presence of an infectious disease, and identification information identifying the user. The biological sample data includes the indication of the presence of the infectious disease; a time and date of sample collection of the biological sample; and an identification of the test system. The information identifying the identity of the user includes an attestation of the identification of the user recorded in conjunction with collecting the biological sample of the user. The method further includes registering and storing the biological sample data in a central storage; associating the attestation of the user with the biological sample of the user; and generating a certificate of association between the attestation of the user and the biological sample of the user. Generating the certificate includes analyzing the attestation of the user, based on the analysis, verifying that the collected biological sample was obtained from the identified user, and assigning a time to live for the certificate. The method then includes receiving from a venue, an access request for the user to access the venue; determining the access request is for a time within the period of the time to live; and providing the certificate of association to the venue.
In an aspect, the attestation of the user is a representation of a biometric sample of the user, the biometric sample of the user obtained in conjunction with collection of the biological sample, the representation generated by a processing device from the obtained biometric sample of the user. The biometric sample may be one or more of a thumb print set recorded from the user, a retina scan recorded from the user, and a DNA sample obtained from the user and analyzed.
In an aspect, the attestation is a video of the user submitting the biological sample, and the video is executed under control of a biological sample routine executed to obtain the biological sample. In a further aspect, the video is witnessed by a trusted agent and the attestation is supplied by the trusted agent.
A health status platform includes a receiving component, having a processor and a data store, that receives a test result a test of a biological sample collected from a human patient. The test result includes an indication of a presence of an infectious disease in the patient, an identification and a verification of the patient from whom the biological sample was collected, a location, time and date of sample collection, and an identification of test of the biological sample. The platform further includes a certificate component that issues a certificate of origin of the biological sample; and a data merging component that cooperates with one or more venue access managers that operate to control access to corresponding venues. The data merging component implements a distributed ledger system that stores encrypted test results of the patient and the identification and verification of the patient, and an end-to-end encryption system that receives encrypted venue access requests from a venue access manager, decrypts the access requests and determines if the access request is valid or not valid, and for valid access requests, provides an encrypted certificate of origin to the venue access manager. In an example, the health status platform may be used to detect infection from a variety of diseases, including respiratory diseases and blood-borne diseases; the platform may be used, for example, to test for infection from sexually-transmitted diseases, influenza, and COVID-19.
A health status system includes a distributed computing system that in turn includes a data store, one or more processors, and wireless and wired communication equipment, the data store including non-transitory-computer-readable media storing a program of instructions that, when executed by a processor, cause the processor to receive from a test system a representation of biological sample data of a human sample collected from a human user and analyzed by the test system for identification of a presence of an infectious disease, and identification information identifying the user. The biological sample data includes the indication of the presence of the infectious disease; a time and date of sample collection of the biological sample; and an identification of the test system. The information identifying the identity of the user includes an attestation of the identification of the user obtained in conjunction with collecting the biological sample of the user. The processor further executes to store the biological sample data in the data store; associate the attestation of the user with the stored biological sample data of the user; and generate a certificate of association between the attestation of the user and the stored biological sample data of the user. To generate the certificate of association, the processor analyzes the attestation of the user, based on the analysis, verifies that the collected biological sample data were obtained from the identified user, and assigns a time to live for the certificate. The processor also receives from a venue, an access request for the user to access the venue; determines the access request is valid; and provides the certificate of association to the venue.
The detailed description refers to the following figures in which like numerals refer to like items, and in which:
When a person is administered a test for an infectious disease, at the user's request/authorization, the test results can be forwarded via the Internet or other communications network to a health status service provider. The health status service would confirm that the person submitting the test results has been tested, and in the case of a positive test is eligible for and in need of available medical care, or in the case of a negative test the person may be allowed to access restricted areas or services. In the case of an antibody test, the result could also indicate immunity to a particular disease for a period of time.
The test being administered can be performed at a medical facility or point of care, at a third party testing location (the entrance to one's place of employment, an educational facility an entertainment venue, a testing kiosk, etc.), or it could be performed at home or other private location by the person themselves taking the test. In each case security and privacy of the test results must be maintained. Each test, whether at a remote facility or in private setting, will have a unique test identification (ID) code. The ID code is assigned by the test kit manufacturer, the testing facility, or the person administering the test. The test ID code is unalterable and is single use. It might be encrypted and written to a public ledger via a technique like blockchain.
For tests performed at a medical facility, point of care or third-party testing location, the test results can be verified as belonging to the individual by the person performing the test. For tests done at a private location, several techniques can be used to verify that the tests results belong to the individual submitting the test.
Private test verification techniques. Tests can be verified in at least the following three ways: user certified techniques; test identification techniques, and remote witness techniques.
User certified techniques. These methods of test verification involve a user submitting some form of identification in the form of a password, fingerprint, iris scan, voice scan, facial recognition, etc. along with an attestation that they are in fact the person for whom the test results apply. The user might also submit a photo or video of themselves taking the test along with the test results or use other methods of identity verification.
Test identification techniques. These methods of test verification involve collecting information from the test bio-sample itself. DNA matching, biomarker profile matching, or other techniques that are unique to an individual that can be discerned by the testing system can verify the identity of the individual and compared to a sample, profile, bio-signature or other information that is on record for that individual. For example, a user can create an initial bio-profile or bio-signature that is stored online for comparing future test samples against so as to verify the identity of the person submitting the test results.
Remote witness techniques. Tests performed in a private location can be witnessed by a third party via a video teleconference or telemedicine application. The third party can be a health care professional, a government employee or the equivalent of a medical notary. The third party can verify that a test with a particular id code was conducted by the person submitting the test results. The third-party certification can be merged with the test results when sent to the health status service provider.
The health status service (HSS) operating a health status platform (HSP) receives test results and validates/certifies that these results belong to a particular person. The HSP performs the following functions:
Maintains a user account. The user account is established by the user, is password protected, has a unique ID and stores user profile information that may include biometric markers, signatures or other identifiers
Receives a test result from a user. Test results can be sent from a point of care facility, a third-party testing facility or a home test system to a health status system provider (HSSP). Information is sent and received in an encrypted format or may be protected with blockchain techniques to ensure complete privacy of the user test results information.
Maintains a Secure Copy of the User's Test Results.
Establishes a timestamp for the test results. Some test results like antigen tests are testing for active infection and may only be valid for a number of hours. Other test types that are antibody tests may show long-term immunity to an infection and may be valid for months or years. As a result, the HSSP would establish a timestamp for the test results.
Establishes a quality of certification of the test results. Based on the various ways that a test can be certified the HSSP will assign a quality of certainty that the test results belong to the person submitting the test results. For example, in the lowest level of certification the user submitting the results attests that these results belong to them. This is the lowest level of certification because a user could submit unverified false information that the test results actually belonged to them. In the highest level of security, a DNA signature could be matched to validate that the test results belong to the user. Various levels of certification can be established in between where third parties validate the test results as belonging to the user.
Provides test results, test type, timestamp and level of certification to third parties with the user's permission. In some cases, the level of certification is not required.
Logs all interactions where health status was provided to third parties and user authorizations. This information can be used to provide a health history over time for the user.
Disclosed herein are systems, platforms, and methods that provide safe and secure transmission of health-related data. The systems and methods ensure validity of health data. The systems and methods provide a convenient and tamper-proof data exchange. As such the systems and methods, and corresponding techniques and architectures, disclosed herein, including but not limited to receiving and using asset and/or write permissions, locking assets, instantiating assets, and/or implementing a multiple tier permission detail a technical solution (implementing interoperability) to a technical problem (non-interoperability). This technical solution improves the operation of the underlying hardware—previously non-interacting hardware systems provide an efficient platform by which to interact. Furthermore, the aforementioned features provide improvements over existing market solutions by providing a technical solution allowing greater interoperation between hardware systems as compared to existing interoperation techniques.
In an example, the test capture and analysis component 2 may be implemented at a kiosk. The kiosk could be located at a specific venue, such as at the entrance to a theme park, a stadium, or an airport terminal. Alternately, the kiosk could be located at a business entrance, and may be used by employees of the business and visitors to the business. Alternately, the kiosk could be located at a pharmacy or at a medical clinic. In this example, the kiosk also may provide some or all the functions of the health status transmission component 3.
In an example, the test capture and analysis component 2 is, or includes a specific health test kit, such as a test kit for testing a user for possible infection from COVID 19 or other relevant diseases potentially affecting public health. Such a test kit may be a small, portable device configured to cooperate with the health status transmission component 3. The test kit includes mechanisms, such as swabs, to acquire a sample from the user, analyze the sample, and provide test result 2a to the health status transmission component 3 over the interface A.
In an example, the user 21 may employ the test kit to self-perform a health test, such as when at home or other private setting.
In another example, such as when implemented at a kiosk, the test capture and analysis component 2 may be configured to perform different types of health tests, such as for COVID 19, influenza, and/or other relevant diseases potentially affecting public health.
The health status transmission component 3 may include mechanisms to control operation of the test capture and analysis component 2. For example, when implemented in the smart phone 20a, the component 3 may include or be in communication with an application (not shown) of the smart phone 20a, and the application may initiate analysis by the component 2, may provide data related to the user to the component 2, and may provide security for the test result 2a (e.g., encryption). Such security processes, and associated security mechanisms are described in more detail herein. Following any processing at the component 3, the test result 2a and any associated data may be sent, encrypted, or otherwise protected, as secure test result 3a to the certification component 4.
The certificate component 4 receives the secure test result 3a over interface B from the health status transmission component 3. In an aspect, the components 3 and 4 may be combined into a single unit or single hardware device. In another aspect, the components 3 and 4 may be co-located such as at a medical clinic. In yet another aspect, the components 3 and 4 are separated and may communicate over a wireless communications network. The transmission mechanism, when components 3 and 4 are not combined in a single unit, may include any suitable digital data exchange mechanism. A process of secure test result 3a transmission is described in more detail herein.
In an example, the certificate component 4 functions to process a secure test result 3a and from the test result processing, generate a digital certificate 4a attesting to the acceptability of the test result for one or more purposes. Those purposes may include, for example, allowing the user 21 whose health is represented by the digital certificate 4a to access one or more venues that are associated with venue access component 6. The digital certificate 4a also may include the test result as well as all information provided in the secure test result 3a. The digital certificate 4a may include the date and time of sample collection, the test kit identification, including manufacturer and date of manufacture, test type, and a unique serial number of the test kit. The digital certificate 4a further may include a time to live for the test result, such as, for example, 24 hours, one week, etc. Upon reaching the time to live, the digital certificate 4a may be disabled, deleted, and/or flushed from any existing storage in the system 1. Alternately, the digital certificate may simply be permanently disabled or deactivated such that it no longer may be used in the system 1 to allow user 21 to gain access to a venue. The digital certificate 4a also may include a quality value. The quality value may be based on the type of test and the identity of the test kit. The quality value further may be based on the process or modality by which the sample is collected and the test result is produced from the sample. The quality value still further may be based on the degree of security, or confidence, in the reliability of the test result. In this regard, a sample collection and analysis modality that provides as close as possible to absolute verification that the user 21 submitting the sample is in fact the user sampled may produce a highest quality value. For example, a test sample collected by a medical professional at a medical clinic and processed to produce a test result by the medical professional may have a highest value. A test sample collected at a kiosk and analyzed at the kiosk may have a high value. A test sample collected by user 21 and applied to a home test kit may have a medium value. Other quality factors and quality rating systems may be employed. A digital certificate 4a with a highest quality may allow user 21 access to any venue while a digital certificate 4a with a medium quality value may allow access to certain venues but not others. In an example, the user 21 may be provided with the quality value required by a venue and the quality value a specific test sample collection and analysis modality will produce, thereby allowing the user 21 to select a modality that should produce the required or desired quality value.
In an example, the certificate component 4 may provide the digital certificate 4a to the component submitting the secure test result 3a. For example, if the submitting component is the smart phone 20a of user 21, the certificate component 4 may transmit the digital certificate 4a to the smart phone 20a. If the test result submitting component is a kiosk, the certificate component 4 may provide the digital certificate 4a to an address input to the kiosk by the user 21; for example, an email address of the user 21. Alternately, the certificate component 4 may provide the digital certificate 4a for printing at the kiosk. When printed, the printed digital certificate 4a may include a tamper-proof RFID (e.g., a read-once RFID). In any aspect, the digital certificate 4a may include an indication readable by the user 21 as to the quality value (e.g., highest, high, medium).
In another example, the certificate component 4 produces a digital certificate 4b with a tamper-proof reference. The reference then may be used to look up and retrieve data such as that incorporated in the digital certificate 4a. The user 21 may employ the digital certificate 4b in its digital form or in a printed form. For example, the user 21 may provide the digital certificate 4b on the user's smart phone display, where the digital certificate may be read at a venue access point.
In an example, the certificate component 4, or aspects of the certificate component 4, may be implemented in a cloud-based system. For example, the component 4 may maintain active as well as deactivated digital certificates 4a, 4b in a cloud storage facility.
As noted herein, the components 3 and 4 may be combined on a single hardware device. In an example, the certificate component 4 may be implemented on the smart phone 20a (or another smart device operated by the user 21, such as a tablet or computer). In this example, digital certificates 4a are stored on the smart phone 20a, where they remain active until expiration of the assigned time to live. When implemented on the smart phone 20a, the component 4 may be a component of the application 22. When implemented on a computer, the component 4 may be a component of a non-transitory computer-readable medium storing a program of instructions (not shown in
When implemented as a service separate from the health status transmission component 3 (e.g., as a cloud-based service), the certificate component 4 may transmit the digital certificates 4a, 4b to the data merging component 5 over interface C. In an aspect, such transmission may require authorization from the user 21. In another example, the user 21 may operate the smart phone 20a, or other smart device, to transmit the digital certificates 4a, 4b to the data merging component 5 over interface E.
The data merging component 5 may produce a certified ticket 6a that the user 21 may employ to access a specific venue 7. However, the certified ticket 6a need not be a “ticket” in its common use. For example, when user 21, when user 21 employs the HSS 1 to schedule a ride-sharing service, the “certified ticket 6a” may be, instead, an electronic file or other mechanism appropriate for a ride sharing service. The data merging component 5 may produce the certified ticket 6a by merging data 6b from the venue access component 6 with a digital certificate 4a, having acquired the digital certificate 4a from the certificate component 4 or the health status transmission component 3. The data merging component 5 may generate the certified ticket 6a when requested or authorized to so by the component 3.
The venue access component 6 may communicate directly with the health status transmission component 3 over interface F and/or with the data merging component 5 over interface D. The venue access component 6 may communicate with one or more venues 7, each of which may control one or more venue access points 8. In an aspect, a venue access point is a gate or entry to a venue 7. The venue access point 8 may be provided with an access control device including, but not limited to a processor-controlled turnstile. The access control point 8 may be configured to allow user 21 to access the venue based on satisfactory reading to a certified ticket 6a independent of how the certificate is read or access is controlled.
In an example, the venue access component 6 may be a component of a venue 7 and further may be implemented at a venue access point 8. In another example, the venue access component acts as a service for multiple venues 7, none of which need be related to each other. For example, one venue 7 could be an airport and a second venue 7 could be a theater.
In an example, the certified ticket 6a may be produced by the venue access component 6 based on inputs received from the test result, or health status transmission component 3 and/or the data merging component 5. In an aspect, the component 3 may provide a digital certificate 4a to the venue access component 6. In another aspect, the component 3 may provide the venue access component 6 with authorization and a mechanism to acquire a digital certificate 4a from the data merging component 5. In yet another aspect, the component 3 may provide the venue access component 6 with authorization and a mechanism to acquire a certified ticket 6a from the data merging component 5.
In the aspect in which the component 3 provides the venue access component 6 with authorization and a mechanism to acquire a digital certificate 4a from the data merging component 5, the venue access component may generate the certified ticket 6a.
The health status transmission component 3 may communicate directly with a venue 7 to request access to the venue 7; that is, to buy a ticket from the venue 7 so as to allow the user 21 to enter the venue 7. Access request 3b may include an implicit or explicit authorization to release the user's digital certificate 4a. Alternately, the access request 3b may include the digital certificate 4a. The venue 7 may pass that access request 3a to the venue access component 6, which may in turn pass the access request to the data merging component 5.
In an example, the processes executed by the components 5 and 6 may result in a user device such as smart phone 20a being provided with a certified ticket 6a. Alternately, the certified ticket 6a may be provided to the venue 7 for pickup by the user 21. In this alternative, the certified ticket 6a may be in digital form (i.e., the certified ticket 6a) or may be printed at the venue 7 and acquired thereat by the user 21 (e.g., will call), when the user 21 supplies the venue 7 with a satisfactory certification 6b, which may be a separate digital file. A satisfactory certification 6b is described in more detail herein.
In
In an aspect, the personal device 20 may be a smart device. Such a smart device may include a program of instructions executed by a smart device processor to support operations of the HSS 10. Alternately, the smart device may include an HSS application 22 that functions to support operations of the HSS 10. The smart device may be a smart phone, tablet, or computer, for example. In another aspect, the personal device 20 may be a dedicated device. Such a dedicated device may include a program of instructions that are executed by a processor on the dedicated device to support operations of the HSS 10. Alternately, such a dedicated device may include an application specific integrated circuit (ASIC) programmed to support operations of the HSS 10. The personal device 20 may be capable of wired and wireless communication, including Bluetooth communication, with other devices or components of the HSS 10, and devices and components outside the HSS 10. In an aspect, the personal device 20 is smart phone 20a.
Wired communications among entities in the HSS 10 may occur over a public network such as A PSTN and/or over a dedicated wired network. A dedicated wired network may be a secure wired network. Such wireless communications may occur over a wireless communication network 11, which may be a wide area network (i.e., the Internet) separated from the HSS 10, and/or over a local area network (LAN), which may be implemented by components of the HSS 10. The communications network 11 may be or may include a virtual private network (VPN) implemented separately from the HSS 10 or as an adjunct to the HSS 10.
The HSS 10 may include one or more rapid test platforms 30. As disclosed herein, such test platforms 30 may be dispersed throughout the HSS 10. The test platforms 30 may be capable of wired communications and wireless communications over the communications network. Operation of the test platforms 30 is described in more detail herein. However, as shown in
In an aspect, a test platform 30 is a one-time use device. The platform 30 may be battery powered. The platform 30 may be implemented to perform a specific test or to perform one or more similar tests. For example, a test platform 30 may be implemented to test for influenza, to test for COVID-19, or to test for both. The test platform 30 includes all components needed to execute a test, such as a test for COVID-19, and to provide the results of the test to the personal device 20.
In another aspect, the test platform 30 may be capable of multiple uses. In a respect, the test platform 30 may be capable of multiple uses by a same user 21. In another respect, the test platform 30 may be capable of use by multiple users 21.
In addition to providing the test result to the personal device 20, the test platform 30 may provide a unique identification. In an aspect, the unique identification may provide one or more of a unique test platform serial number, an identification of the test (e.g., for COVID-19, including the specific test type), test platform manufacturer and date of manufacture (e.g., in case of a shelf-life), and date and time of test. In an aspect, the test platform 30 may provide the geographic location of the test platform. In a respect, the test platform 30 may query the personal device 20 to obtain the geographical location. In another respect, the test platform 30 may obtain the geographical position from an existing but separate GPS system.
When the test platform 30 is used for multiple tests, the test platform 30 may employ a counter, and may provide the counter value with the unique identification.
The test platform 30 may interface with an application 22 implemented on the personal device 20. The application 22 may be acquired from an online store, for example, and may be intended for use with the specific test platform 30.
In an aspect, the application 20 may implement security measures to first verify the validity of the test, second protect the test result from corruption, hacking, or other attack, and third preserve the privacy of the user 21. For example, the application 22 may implement an end-to-end encryption routine. Such security measures are described in more detail herein. The application also may present the test results (or a summary of the test results) for display to the user 21 on a screen or other graphical user interface of the personal device 20.
The personal device 20 may communicate directly with each of the services 40, 50, and 60 in a manner similar to communications described with respect to
The second aspect of the example of the HSS 10 may incorporate additional authentication elements, as shown in
In an example, an HSS may be implemented in part at a point of entry (POE) kiosk for a specific venue such as an airport, a stadium, a theatre, or an office building.
Either the certificate 104a or the certified ticket 104b could be printed or could be provided to the user's smart phone 20a. The camera 102 my record the sample submission and provide a still image of the user 21 on the certificate 104a or the certified ticket 104b. The certificate 104a and the certified ticket 104b may come with a time to live, after which the user may not be able to access the venue.
In an aspect, the HSS 100 may provide a certificate 104a to a data merging service 50, where the certificate 104 may be used, within its time to live, to access other activities at the venue. However, a likely implementation is that the assigned time to live would expire at the end of the specific event at the venue to which the user 21 requests access, or shortly thereafter.
The kiosk 201 includes camera 202, test platform 203, biometrics capture component 204, sample analyzer 205 and digital data input/output 206. The kiosk 201 may be connected to an AC power source, may be battery powered, or may be solar powered, or may be powered by a combination of the foregoing such that upon a loss of AC power, the kiosk 201 may continue to operate. The input/output 206 may include a visual display section or user interface and a mechanism such as a key pad or qwerty keyboard for data entry. The input/output 206 may connect to a wired or wireless data input to receive data from and send data to, for example, smart phone 20a and data merge service 50. To collect and analyze a sample, the kiosk 201 may provide in a user interface of the input/output 206, a menu of test options and instructions for completing a desired test. Note that the kiosk 201 may be configured to acquire and analyze samples for a variety of illnesses. The desired test may be preceded by collection of image data of the user 21 through camera 202, where the image data may be digital still frame images, or video. If implemented, the test also may be preceded by collection of biometric information from the user 21, such as thumbprints. In a test operation, the kiosk 201 provides, through test platform 203, a sample collection device (e.g., a swab). After sample collection, the sample collection device is placed in a receptacle of the test platform 203 and the sample is read. The sample results may be transmitted to the analysis competent (analyzer) 205, where the reading is determined to indicate a negative or positive value, and/or, in some examples, to provide a quantitative value. The determined value is provided to the input/output 206, where the results may be displayed in the user-readable window or interface. The determined value is time-stamped, and data describing and identifying the kiosk, the sample obtained, the user 21, and the test performed are added to the time-stamped value to provide a certified test result that then may be transmitted to the user's smart phone 20a and/or the data merge service 50. In an event where the test result is not or cannot be certified, the test result may be provided to a certificate service (not shown in
The herein disclosed examples of an HSS provide a significant technical advance over existing sample regimes and modalities at least in part because of incorporation of verifiable at-home testing afforded to users such as user 21 of
One aspect of an HSS is an at-home test kit, namely the rapid test platform 30 of
In an example, the kit 301 is a one-time-use device. After a sample is received, analyzed and reported, the kit 301 may be incapable of any further function. In another example, the kit 301 may be refurbished and reused, or may be employed by the same user 21 for one or more additional tests, including tests other than previously executed tests; that is, the kit 301 may be used for multiple, different modalities. In this example, the kit 301 may employ a counter, and a current count may be included with a reported test. The number of tests that the kit 301 may execute may be limited, and the kit 301 may be unusable once the counter has reached a predetermined count.
In addition to the examples shown in
The memory 520 and/or the data store 540 also stores programs, modules and data structures to enable a distributed ledger 522, a ledger management module 524, and a key management module 526. The distributed ledger 522 may be distributed over various network nodes. In an aspect, each network node stores a local copy of the distributed ledger 522. The distributed ledger 522 may store information regarding transactions between different entities in the HSS 400a. In an aspect, the distributed ledger 522 stores a batch of transactions in a block. In an aspect, each block is timestamped. The ledger management module 524 manages the distributed ledger 522. For example, the ledger management module 524 functions to ensure that the local copy of the distributed ledger 522 is synchronized with the local copy of the distributed ledger 522 at other network nodes. In an aspect, the ledger management module 524 participates in consensus protocols associated with the distributed ledger 522. For example, the ledger management module 524 may propose new blocks for the distributed ledger 522 and/or votes on block proposals received from other network nodes. To that end, the ledger management module 524 includes machine instructions, and heuristics, and metadata. The key management module 526 receives a key request from an entity, determines whether the key request is valid, synthesizes a key if the key request is valid, transmits the key to the entity, and stores the key in the distributed ledger 522. The key management module 526 determines whether the key request is valid by determining whether one or more validation criterion stored in the distributed ledger 522 is satisfied. For example, the key management module 526 may execute the method 900 shown in
As
The distributed ledger 522 further may store contract accounts that include programs with computer-executable instructions. In an aspect, the contract accounts are associated with respective contract codes. In an aspect, the contract accounts correspond to respective externally owned accounts. In such aspects, the contract accounts are controlled by their corresponding externally owned accounts. As such, the distributed ledger 522 supports externally owned accounts and contract accounts. In an aspect, the distributed ledger 522 implements a data structure that includes various blocks, with each block holding a batch of individual transactions and including a timestamp indicating block inclusion in the ledger 522. The blocks also may, but need not, include information linking a succeeding block to a previous block. For example, a succeeding block includes a hash of a previous block. When implemented in this fashion, the distributed ledger 522 is referred to as a blockchain.
Each server 510, 610 may include a ledger management module, and a key management module, as shown in
In operation, a transaction module of server 610 may initiate a transaction with the server 510. For example, the personal smart device 400 may communicate with a venue represented by VAM 600 to access that venue. That is, an externally owned account associated with a venue determines to initiate a transaction with an externally owned account associated with the user 21. To execute this transaction, the transaction module of server 610 first may query the distributed ledger 522 to determine if a certification transaction is stored therein that would satisfy access requirements for the venue. The distributed ledger 522 may contain the certification transaction but not the required key. Alternately, the distributed ledger 522 may contain both the key and the certification transaction. Alternately, the distributed ledger 522 could contain neither. Assuming only the key is not available, the server 610 may request the server 510 provide the required key. In response, the transaction module transmits a key request 720 to the key management module. The key request 720 may indicate that the VAM 600 has determined to complete one or more transactions with the smart personal device 400. In an aspect, the key request 720 is to occur between the VAM 600 and the smart personal device 400. In an aspect, the key request 720 indicates a requested transaction type (e.g., health certification (i.e., the key request 720 is for a health credential that the transaction module requires to complete the transaction(s)).
In an aspect, the key management module provides a key 730 in response to receiving the key request 720. In an aspect, the key management module determines whether the key request 720 is a valid request. In an aspect, the key management module accesses the distributed ledger 522 to determine whether the key request 720 satisfies one or more validation criterion. For example, the key management module may query the distributed ledger 522 to determine whether the VAM 600 and the smart personal device 400 are permitted to transact with each other. In another example, the key management module may query the distributed ledger 522 to determine whether the requested time duration, the requested number of transactions, and/or the requested transaction type are permitted. Other validation criteria also are possible. In yet another example, the key management module may query the distributed ledger 522 to determine whether the smart personal device 400 has provided a preference for transactions.
In an aspect, the key management module synthesizes the key 730. In an aspect, the key 730 may be a cryptographic key. In another aspect, the key 730 includes a session key, a pair of keys (e.g., a public key and a private key). In some examples, the pair of keys are asymmetric or a single shared key. For example, the key management module may employ a variety of symmetric-key algorithms, such as Data Encryption Standard (DES) and Advanced Encryption Standard (AES), to generate the key 730. Alternately, the key management module employs a variety of public-key algorithms, such as RSA, to generate the key 730. In an aspect, the key 730 includes a random number. In another aspect, the key 730 is the output of a hash function, where the hash function is a hash of the names of the entities, a time of day, and/or a random number. In another aspect, the key 730 includes a credential. In a further aspect, the first key management module may synthesize the key 730 by activating a contract account that is associated with an externally owned account associated with by the first transaction module. For example, the first key management module may execute instructions associated with the contract account. In this further aspect, the key request 720 may include a contract code for the contract account, and the first key management module employs the contract code to activate the contract account.
In an aspect, the key 730 is associated with a key identifier (ID) that identifies the key, and a validity period that indicates a time duration during which the key 730 is valid. The validity period may be equal to a requested time duration. However, if the requested time duration is greater than a threshold time duration, the validity period may be limited to the threshold time duration. In a further aspect, the key 730 may be associated with a validity number that indicates a number of transactions that can be completed with the key 730. The validity number may be equal to a requested number of transactions. However, if the requested number of transactions is greater than a threshold number of transactions, the validity number may be limited to the threshold number of transactions. In a still further aspect, the key 730 is associated with a validity type that indicates a transaction type that may be completed with the key 720. The validity type may be the same as a requested transaction type. However, if the requested transaction type includes transaction types that are not permitted, the transaction may not be permitted. In an example, the threshold time duration, the threshold number of transactions, and/or the permitted transaction types are represented by one or more validation criterion stored in the distributed ledger 522.
The transaction module 630 may employ the key 730 to synthesize the transaction data 740. In an aspect, the transaction data 740 includes signed data, and the transaction module 630 employs the key 730 to generate a digital signature and to sign the transaction data. In an aspect, the transaction module 630 signs the transaction data 740 (e.g., a hash of the transaction data) with the key 730. A person of ordinary skill in the art will appreciate that the transaction module 630 may employ a variety of signing techniques to synthesize the signed data. For example, the transaction module 630 may employ a Digital Signature Algorithm (DSA) and/or Elliptic Curve Digital Signature Algorithm (ECDSA) to synthesize the signed data. In an aspect, the transaction data 740 includes encrypted data. In this aspect, the transaction module 630 employs the key 730 to encrypt the transaction data 740. Other signing and/or encrypting techniques also are possible. When signed and encrypted, the transaction module 630 transmits the transaction data 740.
The transaction module 530 receives the transaction data 740 and completes the transaction based on the transaction data 740. The transaction module 530 may determine whether the transaction data 740 is valid by, for example, determining whether the key 730 employed to synthesize the transaction data 740 is valid. As such, the transaction module 530 transmits a validation request 750 to the key management module 526. In an aspect, the validation request 750 includes the key 730 (e.g., when the transaction data 740 includes the key 730). In another aspect, the validation request 750 includes the key ID. In yet another aspect, the validation request 750 includes only the transaction data 740. The key management module 526 receives the validation request 750 and determines whether the key 730 employed to synthesize the transaction data 740 is valid by, for example, querying the distributed ledger 522 with the key 730 and/or the key ID. The second key management module 524 then transmits a validation response 760 to the transaction module 530. The validation response 760 indicates a validity status of the key 730. For example, the validation response 760 may indicate the validity period, the validity number, and/or the validity type associated with the key 730 are satisfied.
Based on the validation response 760, transaction module 530 employs the transaction data 740 to complete the transaction. For example, the transaction module 530 may complete the transaction if the validation response 760 indicates that the transaction data 740 was synthesized with a valid key (e.g., the key 730 is valid). In an aspect, the transaction module 530 may further require a current time is within the validity period indicated by the validation response 760, that a current transaction type associated with the transaction data 740 is the same as the validity type indicated by the validation response 760, that a transaction counter indicates the number of transactions completed with the key 730 is less than the validity number indicated by the validation response 760. Note that some transactions when completed may involve executing a smart contract, or completing a money transfer. Thus, in a further aspect, the transaction module 530 may access the distributed ledger 522 to determine whether the transaction is permitted. If the distributed ledger 522 indicates that the transaction is permitted, the second transaction module 530 completes the transaction.
In an example, a transaction module may synthesize a digital wallet, which creates an externally owned account. For example, the transaction module may synthesize a digital wallet for user 21. The digital wallet may be implemented on smart personal device 400. The digital wallet allows user 21 to may online or other electronic purchases, and also provides user 21 with a convenient storage for certified access tickets, for example.
The profile 406 may, in addition to containing biometric data 406a, include a profile history 406b, a profile certification 406c, a transaction history 406d, and other data 410′. Profile biometric data 406a, for example, includes data representing physical and/or behavioral information that can uniquely identify the user 21. The ABK 402 may operate to cause storage of multiple biometric profiles 406, each profile 406 for a different type of biometric data. In an example, a biometric profile 406 may include either or both digital data and analog data. The biometric profile 406 may include a jpeg image. Biometric data 406a may be transformed by a mathematical operation, algorithm, or hash that represents the complete biometric information (e.g., a complete fingerprint scan, a complete retina scan). In an aspect, a mathematical hash may be a “one-way” operation such that there is no practical way to re-compute or recover the complete biometric information from the biometric profile 406. This both reduces the amount of data to be stored and protects the user's personal biometric information. In an aspect, the biometric profile 406 is further protected by encoding using an encoding key and/or algorithm that is stored with the biometric data 406a. Then, for authentication, both the biometric data 406a and the encoding key and/or algorithm are passed to the DMM 500/VAM 600.
In an example, the ABK 402 operates to cause storage of a picture profile that includes one or more jpeg or analog images of the user 21. In a picture authentication operation, the image stored in the ABK 402 may be transmitted to a display at the point of entry of a venue to allow an administrator (e.g., a clerk or security guard) to confirm or reject the identity of the user 21 requesting venue access. In another example, an image of the user 21 may be captured at the point of entry and is compared to the picture profile by an automated image analysis mechanism of the application 22 or an independent device associated with the point of entry. In a point of entry at, for example a hotel, casino, or restaurant, a host could greet the user 21 and allow entry based on recognition of the user's picture profile. The DMM 500 may receive the encoded biometric data 406a from the smart personal device 400 and may use the biometric data 406a as part of a certification process.
In an example, the ABK 402 may automatically transmit encoded biometric data 406a to the DMM 500 when, for example, the user 21 selects this option in the application 22, and when the user 21 applies for access to a venue. In an example, some biometric data 406a may be acquired by operation of the ABK 402 during a trusted initialization process that is administered by a trusted agent. In an example, once initial biometric data 406a have been stored by operation of the ABK 402, the user 21 may add information through operation of the ABK 402 without a trusted agent through self-authentication. For example, an ABK 402 that has an associated stored biometric profile 406 may be unlocked by providing a matching biometric input. Once unlocked, the user 21 may add or remove additional profiles 406, credit card data, personal information, and other information through operation of the ABK 402. For example, in one example, a user who has unlocked the ABK 402 may store additional biometric information (such as fingerprint information in addition to an existing retina scan).
The profile history 406b includes an ID field 411, an agent ID field 413, and a site ID field 415. The profile history 406b relates to the specific hardware, trusted agent, and site used at the time the profile data 406a were created and stored by operation of the ABK 402. In an aspect, each profile 406 stores its specific profile history 406a along with the biometric data 406a and other profile data. The profile history 406b can be recalled for auditing purposes at a later time to ensure the credibility of the stored data. In an example, transaction history 406d also may be stored to a user data segment of the PD memory 410. Here, the ABK 402 stores information associated with any transactions made with the ABK 402, such as the venue name, date of access, and purchase amount.
The ABK 402 also may include programming to implement a biometric reader through cooperation with hardware and software components of the PD 400. For example, fingerprints, retina scans, and image may be captured through employment of an interactive display screen/interface 420 and camera 440, of the PD 400, as appropriate.
Following are example operating scenarios, and corresponding method steps, in which an HSS as disclosed herein (see, e.g.,
User 21 plans to take an airplane trip and the airline requires Sars-Cov-2 testing within 24 hours of boarding the flight. In step A, user 21 creates an account at the HSS 10 and receives an account ID. In step B, within 24 hours of boarding, the user 21 acquires a home Sars-Cov-2 test kit (e.g., kit 301 of
User 21 wants to order an UBER driver and the driver requires a negative Flu NB test within the prior 24 hours. In step A1, if user 21 already has an HSP account, the user 21 simply takes the home test and submit the results to the HSS 10. In step B1, an Uber application on smart phone 20a asks the user 21 to provide a health status certification prior to ordering an UBER driver. In step C1, user 21 enters the HSSP account ID. In step D1, Uber contacts the HSS 10 for health status verification. In step E1, the HSS notifies user 21 that Uber has requested their health status and the user authorizes the release of the user's health status to UBER. In step F1, UBER receives the health status and schedules the driver.
User 21 works at a meat-packing plant and must periodically update the HSS account with valid test results, as required by the company. In step A2, Company has the user's HSS account ID in the company's personnel records and checks at regular intervals that the employee is actively getting tested. Alternately, Company provides a regular testing facility on site and mandates that its personnel get tested there. In step B2, user 21 employs the HSS account ID for access to other venues by proving the user 21 are disease free and to maintain the proof.
The preceding disclosure refers to flowcharts and accompanying descriptions to illustrate the examples represented in
Examples disclosed herein can be implemented in digital electronic circuitry, or in computer software, firmware, or hardware, including the herein disclosed structures and their equivalents. Some examples can be implemented as one or more computer programs; i.e., one or more modules of computer program instructions, encoded on computer storage medium for execution by one or more processors. A computer storage medium can be, or can be included in, a computer-readable storage device, a computer-readable storage substrate, or a random or serial access memory. The computer storage medium can also be, or can be included in, one or more separate physical components or media such as multiple CDs, disks, or other storage devices. The computer readable storage medium does not include a transitory signal.
The herein disclosed methods can be implemented as operations performed by a processor on data stored on one or more computer-readable storage devices or received from other sources.
A computer program (also known as a program, module, engine, software, software application, script, or code) can be written in any form of programming language, including compiled or interpreted languages, declarative or procedural languages, and it can be deployed in any form, including as a stand-alone program or as a module, component, subroutine, object, or other unit suitable for use in a computing environment. A computer program may, but need not, correspond to a file in a file system. A program can be stored in a portion of a file that holds other programs or data (e.g., one or more scripts stored in a markup language document), in a single file dedicated to the program in question, or in multiple coordinated files (e.g., files that store one or more modules, sub-programs, or portions of code). A computer program can be deployed to be executed on one computer or on multiple computers that are located at one site or distributed across multiple sites and interconnected by a communication network.
Lane, Mark T., White, N. Edward, Powell, G. Edward, Marshall, Van L., Clerici, John M.
Patent | Priority | Assignee | Title |
Patent | Priority | Assignee | Title |
5876926, | Jul 23 1996 | Method, apparatus and system for verification of human medical data | |
20030115475, | |||
20100204600, | |||
20120022890, | |||
20140081657, | |||
20160283706, | |||
20160292393, | |||
20190311101, | |||
20200153624, | |||
20210012869, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Feb 15 2021 | TensorX, Inc. | (assignment on the face of the patent) | / |
Date | Maintenance Fee Events |
Feb 15 2021 | BIG: Entity status set to Undiscounted (note the period is included in the code). |
Feb 24 2021 | SMAL: Entity status set to Small. |
Date | Maintenance Schedule |
May 17 2025 | 4 years fee payment window open |
Nov 17 2025 | 6 months grace period start (w surcharge) |
May 17 2026 | patent expiry (for year 4) |
May 17 2028 | 2 years to revive unintentionally abandoned end. (for year 4) |
May 17 2029 | 8 years fee payment window open |
Nov 17 2029 | 6 months grace period start (w surcharge) |
May 17 2030 | patent expiry (for year 8) |
May 17 2032 | 2 years to revive unintentionally abandoned end. (for year 8) |
May 17 2033 | 12 years fee payment window open |
Nov 17 2033 | 6 months grace period start (w surcharge) |
May 17 2034 | patent expiry (for year 12) |
May 17 2036 | 2 years to revive unintentionally abandoned end. (for year 12) |